YoVDO

Electromagnetic Side-Channel Attacks and Potential Countermeasures

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Cryptographic Algorithms Courses

Course Description

Overview

Explore electromagnetic side-channel attacks and potential countermeasures in this 28-minute lecture by Tristen Mullins from the University of South Alabama. Delve into cryptographic algorithms, power versus electromagnetic side-channels, and localized electromagnetic analysis. Learn about differential EM analysis, trace collection techniques, and the importance of probe placement and pre-processing. Discover methods for aligning traces, including static alignment, and examine various side-channel countermeasures. Gain insights into EMA countermeasures, spatial randomization for localized EM, and moving target defense strategies. Conclude with an overview of ongoing work in this critical area of cybersecurity.

Syllabus

Intro
Cryptographic Algorithms
Power vs EM Side-Channels
Localized EMA
Electromagnetic SCA Attacks
Differential EM Analysis
Trace Collection: Localized EM
Trace Collection: Probe Placement
Trace Collection: Pre-Processing
Aligning Traces
Static Alignment
Side-Channel Countermeasures
EMA Countermeasures
Localized EM: Spatial Randomization
Moving Target Defense
Ongoing Work


Taught by

CAE in Cybersecurity Community

Related Courses

Applied Cryptography
University of Colorado System via Coursera
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX
Cryptography Application
Pluralsight
Cryptography Principles for IT Professionals and Developers
Pluralsight
Cryptography for SSCP®
Pluralsight